ID | Votes | Profile Description |
---|---|---|
Mirai Botnet | 3 | The Mirai botnet is a type of malware, malicious software designed to exploit and harm computer systems. It spreads by exploiting vulnerabilities in different systems, most notably through Ivanti Connect Secure bugs and the JAWS Webserver. Once inside a system, it can steal personal information, dis |
Bashlite | 2 | Bashlite, also known as Gafgyt, is a type of malware that specifically targets Linux architecture operating systems. This malicious software is designed to infiltrate your system through dubious downloads, emails, or websites and can cause significant damage without your knowledge. Once Bashlite has |
Ziggy | 1 | Ziggy is a malicious software (malware) known for its damaging and exploitative capabilities. This malware, along with xmrig, can be downloaded and executed via specific scripts. It is associated with various hosted files including TDGG, api.key, tmate, tt.sh, sGAU.sh, t.sh, x86_64.so, xmr.sh, xmrig |
Tsunami | 1 | The "Tsunami" malware, a malicious software designed to exploit and damage computer systems, has caused significant cybersecurity disruptions globally. This malware, whose variants include xmrigDeamon, Bioset, dns3, xmrigMiner, docker-update, dns, 64[watchdogd], 64bioset, 64tshd, armbioset, armdns, |
Kaiten | 1 | Kaiten, also known as Tsunami, is a malware variant that operates as a Distributed Denial of Service (DDoS) bot and an IRC bot. It targets vulnerable Internet of Things (IoT) devices and poorly protected Linux SSH servers, often being distributed alongside other DDoS bots like Mirai and Gafgyt. The |
ID | Type | Votes | Profile Description |
---|---|---|---|
Mirai | is related to | 8 | Mirai is a type of malware that primarily targets Internet of Things (IoT) devices to form botnets, which are networks of private computers infected with malicious software and controlled as a group without the owners' knowledge. In early 2022, Mirai botnets accounted for over 7 million detections g |
Gafgyt Variant | Unspecified | 3 | The Gafgyt variant is a malicious software that poses a significant threat to computer systems and devices. This malware can infiltrate your system through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it has the potential to steal personal information, |
Moobot | Unspecified | 2 | Moobot is a malicious software (malware) that has been causing significant disruption in the digital world. The malware, which can infiltrate systems through various methods such as suspicious downloads, emails, or websites, is known for its capability to steal personal information, disrupt operatio |
Mozi | Unspecified | 2 | Mozi is a type of malware, a malicious software designed to exploit and damage computer systems or devices. It can infiltrate systems via suspicious downloads, emails, or websites, often unbeknownst to the user. Once it gains access, Mozi has the potential to steal personal information, disrupt oper |
Agoent | Unspecified | 1 | AGoent is a sophisticated malware, a malicious software designed to exploit and damage computer systems. This Golang-based agent bot has been observed in multiple attacks, exploiting a year-old vulnerability to launch various nefarious activities. It operates by fetching the script file "exec.sh" fr |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
CVE-2023-1389 | Unspecified | 2 | CVE-2023-1389 is a significant software vulnerability, specifically a command injection flaw, found in TP-Link Archer AX21 routers. The flaw was publicly released in March of this year and has since been exploited by malicious actors to gain unauthorized access to devices. Attack traffic through the |
CVE-2017-18368 | Unspecified | 1 | None |
Source | CreatedAt | Title |
---|---|---|
BankInfoSecurity | 3 months ago | Exploited TP-Link Vulnerability Spawns Botnet Threats |
DARKReading | 3 months ago | Various Botnets Pummel Year-Old TP-Link Flaw in IoT Attacks |
Fortinet | 3 months ago | Botnets Continue Exploiting CVE-2023-1389 for Wide-Scale Spread | FortiGuard Labs |
CERT-EU | 6 months ago | Securing Public Sector Against IoT Malware in 2024 | Zscaler |
CERT-EU | 7 months ago | Attackers Targeting Poorly Managed Linux SSH Servers |
CERT-EU | a year ago | DDoS Malware Distributed Through Compromised Linux SSH Servers |
CERT-EU | a year ago | Cybersecurity threatscape: year 2021 in review |
SANS ISC | 9 months ago | Routers Targeted for Gafgyt Botnet [Guest Diary] - SANS Internet Storm Center |
Securityaffairs | 9 months ago | Who is behind the Mozi Botnet kill switch? |
Securityaffairs | a year ago | Gafgyt botnet is targeting EoL Zyxel routers |
CERT-EU | 9 months ago | IoT security threats highlight the need for zero trust principles - Help Net Security |
MITRE | a year ago | Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows |
BankInfoSecurity | 9 months ago | Breach Roundup: Winter Vivern Hunting For Emails |
Fortinet | a year ago | 2022 IoT Threat Review | FortiGuard Labs |
CERT-EU | a year ago | New Strain of Sotdas Malware Discovered | Qualys Security Blog |
CERT-EU | a year ago | Linux Servers Hacked to Launch DDoS Attacks and Mine Monero Cryptocurrency |
CERT-EU | 10 months ago | Mirai Botnet’s New Wave: hailBot,kiraiBot, catDDoS, and Their Fierce Onslaught |
MITRE | a year ago | Chaos: a Stolen Backdoor Rising Again - GoSecure |
Unit42 | a year ago | Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats |
Unit42 | a year ago | IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits |